Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

161 results about "Bastion host" patented technology

A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of a firewall or in a demilitarized zone (DMZ) and usually involves access from untrusted networks or computers.

Internal control bastion host and security access method of internal network resources

InactiveCN102333090ARealize centralized loginImplement access controlTransmissionAccess methodBastion host
The invention relates to an internal control bastion host and a security access method of internal network resources. The security access method comprises the following steps: an administrator carries out correlation management on natural person account numbers and resource account numbers by the internal control bastion host; the administrator authorizes the accessible resources to a user by the internal control bastion host and sets a user access policy for the internal control bastion host and the internal network resources; the user accesses the internal network resources by logging in the internal control bastion host; the internal control bastion host captures commands input in a user command line and carries out corresponding control according to the preset policy; and the internal control bastion host carries out log record on the commands generated in a server so as to facilitate inquiry management. By adopting the security access method, resource access can be perfectly audited and monitored and a perfect access control policy and centralized single sign-on (SSO) can be provided, thus improving the access security for the internal network equipment and the server in an enterprise and facilitating the user to access the internal network resources by the bastion host.
Owner:LIAONING GOETHINK TECH

Cache password-based network equipment security access system and working method thereof

ActiveCN110719276AEnhance and ensure securityEnhancing and Ensuring ConsistencyTransmissionServer logPassword
The invention discloses a cache password-based network equipment security access system and method. The system is provided with a bastion host server, an AAA server, a log analysis server, a client and managed network equipment, wherein the structures of the bastion host server and the AAA server are respectively improved. The system is innovatively characterized in that a bastion host server caches an account and a password of a client user and forwards the account and the password to an AAA server for authentication; and the traditional local storage and local authentication mode of accountpassword and authority setting of the network equipment is replaced. The cache password is transmitted in an encrypted manner. The managed network equipment only allows the user to access after passing the authentication of the cache password, so that the security and reliability of the login account password of the network equipment can be enhanced and ensured. The AAA server realizes centralizedmanagement of local authentication information dispersed in numerous network devices. The user management authority is finely divided, and the user behavior is limited in a legal management control range, so that the security of the network equipment is ensured.
Owner:BEIJING WANGRUIDA TECH CO LTD

Virtual desktop-based operation and maintenance management method

The invention provides a virtual desktop-based operation and maintenance management method which can reduce the harm caused by misoperation during operation and maintenance and can be used for managing the operation and maintenance personnel in a centralized way. The method comprises the following steps of: (1) enabling the operation and maintenance personnel to log in an operation and maintenance management system by using a browser/server (B/S) mode at an operation and maintenance terminal, and entering the virtual desktop provided by a bastion host; (2) looking over equipment and tools which are needed to be maintained on the virtual desktop; (3) after the operation and maintenance tool corresponding to the operation is selected, automatically establishing the corresponding interlinkage between the operation and maintenance tool and the maintained server according to the configuration of a system administrator; and (4) carrying out maintenance operation by connecting the server on the virtual desktop by the operation personnel. According to the virtual desktop-based operation and maintenance management method, the harm caused by misoperation during operation and maintenance can be alleviated, the operation and maintenance personnel can be managed in a centralized way, the operation of the operation and maintenance personnel is simple by technologies such as the virtual desktop, and single sign-on, and the maintenance process of the server is controllable and auditable by the technologies such as access control and audit for the operation and maintenance.
Owner:BEIJING GUOLUAN INFORMATION TECH

Auditing system and auditing method based on quantum bastion host and quantum bastion host system

The invention discloses an auditing system and an auditing method based on a quantum bastion host and a quantum bastion host system, wherein the auditing method based on the quantum bastion host comprises the following steps: responding to an authentication request of an operation and maintenance terminal and performing authentication; after passing authentication, auditing the operation and maintenance operation of the operation and maintenance terminal, generating an audit record, and sending the audit record to a security encryption device in the form of hardware, so as to generate an audit file and anti-tampering identification information in the security encryption device and perform encryption to generate a storage ciphertext; and receiving and storing the storage ciphertext from the security encryption device. According to the method provided by the invention, the audit file is encrypted and stored by virtue of special hardware equipment, a secret key used for encryption is a quantum random number secret key with true randomness, and the issuing of the quantum random number key depends on a quantum communication network and special hardware equipment to ensure that the security of the key is extremely high, so that the storage security of the audit file in the quantum bastion host is guaranteed.
Owner:ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD

Security configuration checking system

The invention discloses a security configuration checking system. In a remote checking process, an access mode of target equipment, a login user name and a login password need to be output; remote check can be achieved only when a check target and a tool can be reached by an IP and the check target opens related service and ports; for the remote check, a plurality of sets of equipment can be simultaneously checked through the appointed concurrent access quantity; for the remote check which the IP cannot reach directly, property information and login information of skip intermediate equipment can be set through some intermediate equipment such as bastion host skip and through a skip table function; target equipment is accessed after skip; when a dynamic password is needed, corresponding intermediate equipment or the bastion host can be mutually logged in to form activity conversation through a share conversation function, a system can be connected to the intermediate equipment or the bastion host through the conversation to access the target equipment to collect security configuration to perform security configuration base line check, and finally a configuration check result is output.
Owner:信联科技(南京)有限公司

Service authority opening method and device, storage medium and electronic device

The invention relates to the field of computers, and provides a service authority opening method and device, a computer readable storage medium and an electronic device, and the method comprises the steps of obtaining authority application information sent by a user, the authority application information comprising one or more pieces of information related to the service authority; automatically generating field information corresponding to the authority application information according to the authority application information; sending the field information to a bastion host system through apreset interface; and receiving prompt information returned by the bastion host system through the preset interface. According to the present invention, on one hand, manual configuration of operationand maintenance personnel can be avoided, the pressure of the operation and maintenance personnel is reduced, the labor cost of operation and maintenance is reduced, and the operation and maintenanceefficiency is improved; on the other hand, the opening accuracy is greatly improved compared with the opening accuracy of manual configuration, and the user experience is further improved.
Owner:TAIKANG LIFE INSURANCE CO LTD

Bastion host, operation and maintenance auditing method, electronic equipment and storage medium

The invention relates to a bastion host, an operation and maintenance auditing method, electronic equipment and a storage medium. The bastion host comprises a protocol proxy service module and a graphical interface service module, and the protocol proxy service module is coupled with the graphical interface service module; the protocol proxy service module is used for receiving operation and maintenance task starting parameters, sent by an operation and maintenance client, of target equipment, and the target equipment comprises first equipment to be subjected to operation and maintenance auditing; and the graphical interface service module is used for starting the first equipment according to the operation and maintenance task starting parameters, generating a graphical interface corresponding to the started first equipment and sending the graphical interface to the operation and maintenance client through the protocol agent service module, and the graphical interface is associated with operation and maintenance data for auditing the first equipment. According to the invention, the problem of low security of operation and maintenance auditing in related technologies is solved, and the security of operation and maintenance auditing is improved.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Automatic configuration management method and device based on bastion host

The invention discloses an automatic configuration management method and device based on a bastion host, and the method comprises the steps: providing an automatic operation and maintenance entrance through a front-end management interface, collecting user input, and constructing an operation and maintenance task request according to an operation and maintenance task; the Thrift service receives the task request sent by the front end and analyzes the task request, and an Ansile interface is called; the Ansile receives the calling of the Thrift service and logs in the target host through the SSH to execute the operation and maintenance task, and a task result returns the Thrift service in a JSON format; the Thrift returns a task result after the Ansile execution to the front-end managementinterface in a JSON format; and displaying the task result by a front-end management interface.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products